Microsoft responded quietly after detecting secret database hack in 2013
http://ift.tt/2ytwECs
Submitted October 17, 2017 at 08:05PM by QuirkySpiceBush
via reddit http://ift.tt/2gi2R6b
http://ift.tt/2ytwECs
Submitted October 17, 2017 at 08:05PM by QuirkySpiceBush
via reddit http://ift.tt/2gi2R6b
U.S.
Microsoft responded quietly after detecting secret database hack in 2013
Microsoft Corp's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.
Untangling Exotic Architectures with Binary Ninja
http://ift.tt/2x3vVVt
Submitted October 17, 2017 at 08:38PM by gaasedelen
via reddit http://ift.tt/2yQ36Ax
http://ift.tt/2x3vVVt
Submitted October 17, 2017 at 08:38PM by gaasedelen
via reddit http://ift.tt/2yQ36Ax
Ret2 Systems Blog
Untangling Exotic Architectures with Binary Ninja
October 13th marked the conclusion of FireEye’s fourth annual Flare-On Challenge. Every year the Flare-On challenge attracts thousands of hackers, security r...
ZDI researcher uses Foxit Reader to demonstrate how fuzzing pieces of an application separately saves time and helps analysis.
http://ift.tt/2gqyVIL
Submitted October 17, 2017 at 08:21PM by RedmondSecGnome
via reddit http://ift.tt/2hMl105
http://ift.tt/2gqyVIL
Submitted October 17, 2017 at 08:21PM by RedmondSecGnome
via reddit http://ift.tt/2hMl105
Zero Day Initiative
Wrapping the Converter within Foxit Reader
PDF readers are an essential part of our daily workflow nowadays. Many of
these readers support more features than just navigating a PDF. For
example, a lot of the PDF readers support image conversion, including Adobe
Acrobat Pro (DC) and Foxit Reader…
these readers support more features than just navigating a PDF. For
example, a lot of the PDF readers support image conversion, including Adobe
Acrobat Pro (DC) and Foxit Reader…
Requesting feedback on Pulsedive community threat intel platform
https://pulsedive.com
Submitted October 17, 2017 at 09:00PM by netbroom
via reddit http://ift.tt/2kTHvB7
https://pulsedive.com
Submitted October 17, 2017 at 09:00PM by netbroom
via reddit http://ift.tt/2kTHvB7
Pulsedive
Threat Intelligence - Pulsedive
Pulsedive is a free threat intelligence platform. Search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own.
I ran a phishing test against our tech-savvy company. The results show that timing and content really matter and your users may not be as able to spot a phishing attack as you think!
http://ift.tt/2wJyvQE
Submitted October 17, 2017 at 08:59PM by DougEubanks
via reddit http://ift.tt/2zhdwoS
http://ift.tt/2wJyvQE
Submitted October 17, 2017 at 08:59PM by DougEubanks
via reddit http://ift.tt/2zhdwoS
Atlantic BT
Phishing Your Coworkers to Save Your Company | Atlantic BT
90% of data breaches involve phishing or other social-based attacks. It’s easy to think we wouldn’t be fooled by an email phishing attack. Or that our friends and coworkers know how to identify a suspicious email or not. But like a lot of our work at ABT…
Introducing Miscreant: a multi-language misuse resistant encryption library
http://ift.tt/2ywOB3C
Submitted October 17, 2017 at 09:39PM by bascule
via reddit http://ift.tt/2yu20Hw
http://ift.tt/2ywOB3C
Submitted October 17, 2017 at 09:39PM by bascule
via reddit http://ift.tt/2yu20Hw
reddit
Introducing Miscreant: a multi-language misuse... • r/netsec
1 points and 0 comments so far on reddit
HackWest 2018 CFP is Open
http://ift.tt/2gLb6bp
Submitted October 17, 2017 at 09:31PM by Nemus0
via reddit http://ift.tt/2hOg6eS
http://ift.tt/2gLb6bp
Submitted October 17, 2017 at 09:31PM by Nemus0
via reddit http://ift.tt/2hOg6eS
Microsoft responded quietly after detecting secret database hack in 2013
http://ift.tt/2zu5JVV
Submitted October 17, 2017 at 09:29PM by ourlifeintoronto
via reddit http://ift.tt/2igaQVj
http://ift.tt/2zu5JVV
Submitted October 17, 2017 at 09:29PM by ourlifeintoronto
via reddit http://ift.tt/2igaQVj
U.S.
Microsoft responded quietly after detecting secret database hack in 2013
Microsoft Corp's secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.
From Trapping to Hunting: Intelligently Analyzing Anomalies to Detect Network Compromises
http://ift.tt/2grdHuj
Submitted October 17, 2017 at 11:00PM by teksquisite
via reddit http://ift.tt/2x1YToR
http://ift.tt/2grdHuj
Submitted October 17, 2017 at 11:00PM by teksquisite
via reddit http://ift.tt/2x1YToR
Lastline
From Trapping to Hunting: Intelligently Analyzing Anomalies to Detect Network Compromises
Breach Detection Systems (BDS) trap attacks that display sufficient evidence of a possible breach, but are at risk of false positives when the sensitivity level is set too low. Hunting attacks with anomaly detection systems
Wiping Out CSRF
http://ift.tt/2xNPhlX
Submitted October 17, 2017 at 10:58PM by jrozner
via reddit http://ift.tt/2zvOTpC
http://ift.tt/2xNPhlX
Submitted October 17, 2017 at 10:58PM by jrozner
via reddit http://ift.tt/2zvOTpC
Medium
Wiping Out CSRF
It’s 2017 and there shouldn’t be much more to say about Cross-Site Request Forgery (CSRF) that hasn’t already been said. It’s a…
Executives are underinvesting in cybersecurity – even though they are the most vulnerable...
http://ift.tt/2gMxcdo
Submitted October 17, 2017 at 11:40PM by robthesecurityguy
via reddit http://ift.tt/2iijuTc
http://ift.tt/2gMxcdo
Submitted October 17, 2017 at 11:40PM by robthesecurityguy
via reddit http://ift.tt/2iijuTc
Proactive Cyber Defense Leader Cybersecurity SaaS
Why are executives underinvesting in cybersecurity, even when they are the most vulnerable? - Proactive Cyber Defense Leader Cybersecurity…
cybersecurity investing
TPM can be exploited by breaching weak RSA keys used by the hardware. HP, Lenovo, Fujitsu affected.
http://ift.tt/2ykc0mO
Submitted October 17, 2017 at 11:32PM by Derbel__McDillet
via reddit http://ift.tt/2gMxf94
http://ift.tt/2ykc0mO
Submitted October 17, 2017 at 11:32PM by Derbel__McDillet
via reddit http://ift.tt/2gMxf94
Note to the CISO: Part 1 - The Evolving Application Security Landscape
http://ift.tt/2yw9ZWB
Submitted October 18, 2017 at 01:30AM by Mi3Security
via reddit http://ift.tt/2gpbY8G
http://ift.tt/2yw9ZWB
Submitted October 18, 2017 at 01:30AM by Mi3Security
via reddit http://ift.tt/2gpbY8G
Mi3 Security
Note to the CISO: Part 1 - The Evolving Application Security Landscape
In a world where your smartphone is becoming the core authentication
device for every Internet service, we need to understand how app
development practices are impacting security and privacy.
device for every Internet service, we need to understand how app
development practices are impacting security and privacy.
HackerOne CEO and Hackers on Bug Bounty Programs
http://ift.tt/2zwogRa
Submitted October 18, 2017 at 05:25AM by jonobacon
via reddit http://ift.tt/2yqracK
http://ift.tt/2zwogRa
Submitted October 18, 2017 at 05:25AM by jonobacon
via reddit http://ift.tt/2yqracK
Forbes
A Security CEO and Two Hackers on Building a Safer Internet, Powered by a Community of Hackers
Notable Security CEO Mårten Mickos and two prominent hackers share how a global community of hackers is helping to create a safer Internet and governments, all while changing the notion of what a "hacker" is.
Significant security flaws in smartwatches for children
http://ift.tt/2yv0Qf3
Submitted October 18, 2017 at 01:07PM by rlmaers
via reddit http://ift.tt/2yRzEdq
http://ift.tt/2yv0Qf3
Submitted October 18, 2017 at 01:07PM by rlmaers
via reddit http://ift.tt/2yRzEdq
www.forbrukerradet.no
Significant security flaws in smartwatches for children : Forbrukerrådet
The Norwegian Consumer Council has uncovered serious security and privacy flaws in smartwatches for children. Strangers can easily seize control of the watches and use them to track and eavesdrop on children.
Here are some telltale signs indicating that a security camera has already been compromised
1.The security camera produces strange noises–It can be very hard to tell or detect whether a security camera is hacked or not. One of the signs that a camera is already compromised or hacked is when there are strange voices or noise coming from it. This means that the hacker has already gained control of the camera and is already operating it.2.The security settings of the camera have been altered or changed– Another indication that a camera has already been hacked is when its security settings have been altered or the password was set to default.3.The camera rotates abnormally – If you observe that your camera is following your movement, there is a very high possibility that it is already compromised and is being controlled by the hacker. The other signs of a hacked camera are when it rotates by itself and points to a different direction than usual.4.Randomly blinking light emitting diode (LED) light –Arandomly blinking LED light is an indication that your webcam security camera is already compromised. To verify this, restart your computer and observe whether the light flashes again in about 10 minutes or so. If this happens, your camera is already hacked. To prevent your computer from being infected with a malware, disconnect it from the Internet and run a full system scan using an anti-virus program.5.Turned on LED light – If you observe that the LED light of a security camera is on even if you did not switch the camera on, it shows that it is already being controlled by someone else. You can verify this by performing the steps mentioned above.6.Sudden increase in network traffic– One way to determine if your surveillance system is already compromised is to check the data flow on your network and on your security camera. If there are sudden or abrupt increases in your network traffic, there is a high possibility that your system is already hacked.From ANNKE blog: http://ift.tt/2zxwGYv
Submitted October 18, 2017 at 02:29PM by AnnkeSecurity
via reddit http://ift.tt/2x50PNu
1.The security camera produces strange noises–It can be very hard to tell or detect whether a security camera is hacked or not. One of the signs that a camera is already compromised or hacked is when there are strange voices or noise coming from it. This means that the hacker has already gained control of the camera and is already operating it.2.The security settings of the camera have been altered or changed– Another indication that a camera has already been hacked is when its security settings have been altered or the password was set to default.3.The camera rotates abnormally – If you observe that your camera is following your movement, there is a very high possibility that it is already compromised and is being controlled by the hacker. The other signs of a hacked camera are when it rotates by itself and points to a different direction than usual.4.Randomly blinking light emitting diode (LED) light –Arandomly blinking LED light is an indication that your webcam security camera is already compromised. To verify this, restart your computer and observe whether the light flashes again in about 10 minutes or so. If this happens, your camera is already hacked. To prevent your computer from being infected with a malware, disconnect it from the Internet and run a full system scan using an anti-virus program.5.Turned on LED light – If you observe that the LED light of a security camera is on even if you did not switch the camera on, it shows that it is already being controlled by someone else. You can verify this by performing the steps mentioned above.6.Sudden increase in network traffic– One way to determine if your surveillance system is already compromised is to check the data flow on your network and on your security camera. If there are sudden or abrupt increases in your network traffic, there is a high possibility that your system is already hacked.From ANNKE blog: http://ift.tt/2zxwGYv
Submitted October 18, 2017 at 02:29PM by AnnkeSecurity
via reddit http://ift.tt/2x50PNu
Annke Blog
How would I know If my security cameras were hacked? - Annke Blog
Do you know ways to against hacking? While the security cameras are protecting your home, you should also keep them safe from hackers. Let's find out how.
bitcointalk.org intelligence scraping
http://ift.tt/2x3wcaY
Submitted October 18, 2017 at 01:32PM by blackout-314
via reddit http://ift.tt/2kYcZ9l
http://ift.tt/2x3wcaY
Submitted October 18, 2017 at 01:32PM by blackout-314
via reddit http://ift.tt/2kYcZ9l
GitHub
GrayHats/btctalkint
btctalkint - bitcointalk.org intelligence scraping data
Putin's 'chef,' the man behind the troll factory @CNNPolitics
http://cnn.it/2gptERK
Submitted October 18, 2017 at 03:41PM by Bastet1
via reddit http://ift.tt/2gqOzE0
http://cnn.it/2gptERK
Submitted October 18, 2017 at 03:41PM by Bastet1
via reddit http://ift.tt/2gqOzE0
reddit
Putin's 'chef,' the man behind the troll factory... • r/security
4 points and 1 comments so far on reddit
HOW FM INDUSTRY CAN CHANGE SECURITY SERVICES IN DUBAI
http://ift.tt/2gP9jlR
Submitted October 18, 2017 at 03:23PM by BritaWien
via reddit http://ift.tt/2iiuUXk
http://ift.tt/2gP9jlR
Submitted October 18, 2017 at 03:23PM by BritaWien
via reddit http://ift.tt/2iiuUXk
Integrated Facility Management Group
HOW FM INDUSTRY CAN CHANGE SECURITY SERVICES IN DUBAI
Being a facilities management company in Dubai, we understand what your business needs when it comes to Security Services in Dubai
BAE Systems report links Taiwan heist to North Korean LAZARUS APT
http://ift.tt/2zx4QvM
Submitted October 18, 2017 at 03:16PM by MicheeLengronne
via reddit http://ift.tt/2x3I397
http://ift.tt/2zx4QvM
Submitted October 18, 2017 at 03:16PM by MicheeLengronne
via reddit http://ift.tt/2x3I397
Security Affairs
BAE Systems report links Taiwan cyber heist to North Korean LAZARUS APT group
Researchers at BAE Systems investigated the recent cyber-heist that targeted a bank in Taiwan and linked the action to the notorious Lazarus APT group.
Adobe Patches Zero-day Vulnerability Used in Cyberespionage - Security News
http://ift.tt/2ywMwUT
Submitted October 18, 2017 at 05:15PM by neko2314
via reddit http://ift.tt/2xNyhaN
http://ift.tt/2ywMwUT
Submitted October 18, 2017 at 05:15PM by neko2314
via reddit http://ift.tt/2xNyhaN
Trendmicro
Adobe Patches Zero-day Vulnerability Used in Cyberespionage - Security News - Trend Micro USA
Adobe has released an emergency security update addressing a zero-day vulnerability (CVE-2017-11292) that researchers found actively exploited by a group of threat actors known as BlackOasis.